Análise de desempenho e conformidade em bibliotecas criptográficas para Internet das Coisas
Abstract
In the context of the Internet of Things (IoT) there are major challenges related to data security, mainly due of devices with low computational power present in this scenario. This paper presents a survey and performance comparison between cryptographic libraries specially optimized for Arduino. Experiments were performed considering performance, memory consumption, storage and compliance.
References
Bassham III, L. E. (2002). The advanced encryption standard algorithm validation suite (aesavs). NIST Information Technology Laboratory.
Blaze, M., Diffie, W., Rivest, R. L., Schneier, B., and Shimomura, T. (1996). Minimal key lengths for symmetric ciphers to provide adequate commercial security. a report by an ad hoc group of cryptographers and computer scientists. Technical report.
Dworkin, M. (2001). Nist special publication 800-38: Recommendation for block cipher modes of operation. US National Institute of Standards and Technology,¡ http://csrc.nist. gov/publications/nistpubs/800-38a/sp800-38a. pdf.
NIST (2001). 197, advanced encryption standard (aes), national institute of standards and technology, us department of commerce, november 2001. Link in: http://csrc. nist.gov/publications/fips/fips197/fips-197. pdf.
Zhang, Z.-K., Cho, M. C. Y.,Wang, C.-W., Hsu, C.-W., Chen, C.-K., and Shieh, S. (2014). IoT security: ongoing challenges and research opportunities. In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on, pages 230–234. IEEE.
Blaze, M., Diffie, W., Rivest, R. L., Schneier, B., and Shimomura, T. (1996). Minimal key lengths for symmetric ciphers to provide adequate commercial security. a report by an ad hoc group of cryptographers and computer scientists. Technical report.
Dworkin, M. (2001). Nist special publication 800-38: Recommendation for block cipher modes of operation. US National Institute of Standards and Technology,¡ http://csrc.nist. gov/publications/nistpubs/800-38a/sp800-38a. pdf.
NIST (2001). 197, advanced encryption standard (aes), national institute of standards and technology, us department of commerce, november 2001. Link in: http://csrc. nist.gov/publications/fips/fips197/fips-197. pdf.
Zhang, Z.-K., Cho, M. C. Y.,Wang, C.-W., Hsu, C.-W., Chen, C.-K., and Shieh, S. (2014). IoT security: ongoing challenges and research opportunities. In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on, pages 230–234. IEEE.
Published
2020-03-23
How to Cite
ROCHA, Igor; SCHOTT, Richard; VERLY, Pedro; LAZARIN, Nilson.
Análise de desempenho e conformidade em bibliotecas criptográficas para Internet das Coisas. In: REGIONAL SCHOOL ON INFORMATION SYSTEMS OF RIO DE JANEIRO (ERSI-RJ), 6. , 2019, Duque de Caxias.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2020
.
